Josep Pegueroles

According to our database1, Josep Pegueroles authored at least 27 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Managing Privacy in the Internet of Things: DocCloud, a Use Case.
Proceedings of the Advanced Research in Data Privacy, 2015

Private surveys on VoIP.
Comput. Commun., 2015

2014
DocCloud: A document recommender system on cloud computing with plausible deniability.
Inf. Sci., 2014

A methodology to introduce sustainability into the final year project to foster sustainable engineering projects.
Proceedings of the IEEE Frontiers in Education Conference, 2014

2013
Low-cost group rekeying for unattended wireless sensor networks.
Wirel. Networks, 2013

The TAMESIS Project: Enabling Technologies for the Health Status Monitoring and Secure Exchange of Clinical Record.
Proceedings of the Seventh International Conference on Complex, 2013

2012
Design of a P2P content recommendation system using affinity networks.
Comput. Commun., 2012

A Context-Based Surveillance Framework for Large Infrastructures.
Proceedings of the Ambient Intelligence - Software and Applications, 2012

2008
Shared Self-Organized GKM Protocol for MANETs.
J. Inf. Sci. Eng., 2008

SCFS: Towards Design and Implementation of a Secure Distributed Filesystem.
Proceedings of the SECRYPT 2008, 2008

2007
Providing Security Services in a Resource Discovery System.
J. Networks, 2007

Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks.
Comput. Commun., 2007

Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm.
Proceedings of the Computational Science and Its Applications, 2007

Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
Proceedings of the The Second International Conference on Availability, 2007

2006
Multicast Copyright Protection System Based on a Trusted Soft-Engine.
Int. J. Bus. Data Commun. Netw., 2006

Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques.
Proceedings of the SECRYPT 2006, 2006

Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

A Practical Solution for Distribution Rights Protection in Multicast Environments.
Proceedings of the Computational Science and Its Applications, 2006

Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks.
Proceedings of the The First International Conference on Availability, 2006

2005
Energy Efficiency of Load Balancing in MANET Routing Protocols.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

Multimedia Copyright Protection Platform Demonstrator.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Reducing the Communication Overhead of an Offline Revocation Dictionary.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Security Issues in Virtual Grid Environments.
Proceedings of the Computational Science, 2004

2003
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Enabling Secure Multicast Using a New Java LKH Rekeying Tool.
Proceedings of the Web Engineering, International Conference, 2003

Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...